A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.
☆13Jan 15, 2025Updated last year
Alternatives and similar repositories for AtlasReaper
Users that are interested in AtlasReaper are comparing it to the libraries listed below
Sorting:
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Artifact monitoring that ensures fairplay☆78Jan 29, 2025Updated last year
- ☆20Nov 1, 2022Updated 3 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆106Jan 24, 2024Updated 2 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- ☆14Mar 30, 2022Updated 3 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- SIP Tools☆14Sep 15, 2016Updated 9 years ago
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- Cobalt Strike BOF Files with Nim!☆86Jul 10, 2022Updated 3 years ago
- HTML Smuggling with Web Assembly☆66Feb 20, 2024Updated 2 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago
- Subdomain finder☆15Jul 16, 2024Updated last year
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- A Cobaltstrike container, built for Warhorse☆41Aug 8, 2024Updated last year
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- ☆65Mar 15, 2024Updated last year
- ☆75Feb 4, 2024Updated 2 years ago
- Aggressor script add-in for CobaltStrike to track file uploads☆48Nov 7, 2022Updated 3 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- C# port of chm lib☆24Sep 7, 2011Updated 14 years ago
- A BOF for lazy people☆23Apr 4, 2024Updated last year
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- ☆26Nov 25, 2025Updated 3 months ago